answer sets inherit semi-monotonicity (from justified
extensions), this clearly emphasizes their central role
in a possible incremental treatment of arguments with
logic programs. In the second section below, we re-
call some basic notions about abstract argumentation
frameworks (Dung, 1995) and default theories (Re-
iter, 1980). After reminding (after (Dung, 1995)) how
to extract an argumentation frameworkfrom an equiv-
alent initial default theory, we propose in the third sec-
tion the converse translation, that is how to express an
argumentation framework as a default theory. In the
fourth section we establish a mapping between max-
imal conflict-free sets of arguments and justified ex-
tensions, which allows to further characterize admis-
sible sets of arguments (and hence preferred exten-
sions) as a special kind of justified extensions. The
fifth section extends this characterization to ι-answer
sets and describes the computation of admissible sets
with help of integrity constraints.
In the following, we will denote atomic elements
by lowercase letters and sets by shift case letters. Fol-
lowing a widespread tradition, greek letters are also
used in definitions and theorems related to defaults
and answer sets. We will use some of the standard
operations of set theory (∪ for union, \ for set differ-
ence, × for cartesian product, 2
S
for the power set of
S). The symbols ⊤ and ⊥ denote the usual truth val-
ues, and ¬, ∨, ∧ the usual connectors of propositional
logic.
2 PRELIMINARIES
We briefly recall some basic definitions, first on
argumentation frameworks, then on default theories.
Logic programs will be considered in a further
section.
An argumentation framework is a pair hAR, attacksi
where AR is a set and attacks is a relation over AR,
i.e. attacks ⊆ AR × AR. Each element of AR is
called an argument and a attacks b means that there
is an attack from a to b. Accordingly a is said to
be an attacker of b (thus a is a counterargument for
b). By extension, a set S ⊆ AR attacks an argument
a ∈ AR iff some argument in S attacks a. On the
contrary, S defends a iff for each b ∈ AR, if b attacks a
then S attacks b. In this case, a is also said to be
acceptable with respect to S. The attacks relation
induces a kind of coherence with different degrees
among arguments. First, S ⊆ AR is conflict free iff
there are no a and b in S such that a attacks b. Further,
S is said admissible iff S is conflict free and defends
all its elements. S is called a complete extension iff
S is an admissible set such that each argument that
S defends is in S. A preferred extension is then a
⊆-maximal admissible subset of AR. Eventually, S
is a stable extension iff S is conflict free and attacks
each argument that is not in S.
Example 1. Consider the following argument frame-
work AF1, in which the arrows represent the attack
relation over the arguments a, b, c, d, e, f, g:
a b c d e
f
g
The admissible sets are:
/
0, {a}, {c}, {d}, {a, c},
{a, d}, {d, f}, {a, d, f}. The preferred extensions
are {a, c}, {a, d, f}. The unique stable extension
is {a, d, f}. Remind that, whatever the kind of
extension being under consideration (admissible,
preferred, or stable), it is a subset of a maximal
conflict-free set, being here one among {a, c, e},
{a, c, f}, {a, c, g}, {a, d, f}, {a, d, g}, {b, d, f},
{b, d, g}, {b, e}.
Let us now briefly remind some of the principal
notions about default reasoning (Reiter, 1980). A
default is an expression of the form
α:β
1
...β
n
γ
where α,
β
i
, 1 ≤ i ≤ n, and γ are closed first-order sentences
with α being called the prerequisite, β
i
the justifi-
cations, and γ the conclusion. Considering a set of
defaults D, the functions PREREQ(D), JUST(D),
and CONS(D) refer respectively to all prerequisites,
justifications, and consequences of the defaults of D.
A default theory ∆ is a pair (W, D) where W is a set of
closed first-order sentences, and D is a set of defaults.
Intuitively, the consequence of a default holds if its
prerequisite holds and nothing can prevent the justi-
fication to hold (i.e. the negation of the justification
does not hold). The main consequence of this idea is
captured by the notion of extension. The following
characterizations of R- and J-extensions (respectively
due to (Reiter, 1980) and (Łukaszewicz, 1988)) are
given here after (Risch, 1996). Consider ∆ = (W, D).
A subset D
′
of D is grounded in W iff for all d ∈ D
′
,
there is a finite sequence d
0
, . . . d
k
of elements
of D
′
such that (1) PREREQ({d
0
}) ∈ Th(W),
(2) for 1 ≤ i ≤ k − 1, PREREQ({d
i+1
}) ∈
Th(W) ∪ CONS({d
0
, . . . d
i
}), and d
k
= d. Then,
let D
′
be any subset of D; E = Th(W ∪CONS(D
′
)) is:
(1) a J-extension of ∆ iff D
′
is a maximal grounded
subset of D such that for all β ∈ JUST(D
′
), ¬β 6∈ E;
(2) a R-extension of ∆ iff it is a J-extension, and for
each default d ∈ D\ D
′
, d =
α:β
1
...β
n
γ
, either α 6∈ E or
ICAART 2012 - International Conference on Agents and Artificial Intelligence
238